Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
暂无分享,去创建一个
Yongdae Kim | Yunmok Son | Hocheol Shin | Kibum Choi | Juhwan Noh | Jaeyeong Choi | Yunmok Son | Yongdae Kim | Hocheol Shin | Juhwan Noh | Jaeyeong Choi | Kibum Choi
[1] Randy H. Katz,et al. Protocol-Independent Adaptive Replay of Application Dialog , 2006, NDSS.
[2] Helen J. Wang,et al. Discoverer: Automatic Protocol Reverse Engineering from Network Traces , 2007, USENIX Security Symposium.
[3] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[4] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[5] Helen J. Wang,et al. Tupni: automatic reverse engineering of input formats , 2008, CCS.
[6] Dawn Xiaodong Song,et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering , 2009, CCS.
[7] Zhi Wang,et al. ReFormat: Automatic Reverse Engineering of Encrypted Messages , 2009, ESORICS.
[8] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[9] Arnold Rosenbloom,et al. AutoFuzz: Automated Network Protocol Fuzzing Framework , 2010 .
[10] Kenji Kono,et al. AspFuzz: A state-aware protocol fuzzer based on application-layer protocols , 2010, The IEEE symposium on Computers and Communications.
[11] Paulo Veríssimo,et al. Reverse Engineering of Protocols from Network Traces , 2011, 2011 18th Working Conference on Reverse Engineering.
[12] Muhammad Torabi Dashti,et al. SECFUZZ: Fuzz-testing security protocols , 2012, 2012 7th International Workshop on Automation of Software Test (AST).
[13] Li Guo,et al. A semantics aware approach to automated reverse engineering unknown protocols , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[14] Baojiang Cui,et al. RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSM , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[15] Christian Rossow,et al. ProVeX: Detecting Botnets with Encrypted Command and Control Channels , 2013, DIMVA.
[16] F. Dressler,et al. A GNU Radio-based IEEE 802.15.4 Testbed , 2013 .
[17] Antonio Nucci,et al. SANTaClass: A Self Adaptive Network Traffic Classification system , 2013, 2013 IFIP Networking Conference.
[18] Guillaume Hiet,et al. Towards automated protocol reverse engineering using semantic information , 2014, AsiaCCS.
[19] Gaogang Xie,et al. ProWord: An unsupervised approach to protocol feature word extraction , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[20] Patrick P. C. Lee,et al. Exploiting intra-packet dependency for fine-grained protocol format inference , 2015, 2015 IFIP Networking Conference (IFIP Networking).
[21] Marco Mellia,et al. Automatic protocol field inference for deeper protocol understanding , 2022 .